Which of the following could BEST prevent this issue from occurring again?
A recently installed application update caused a vital application to crash during the middle
of the workday. The application remained down until a previous version could be reinstalled
on the server, and this resulted in a significant loss of data and revenue. Which of the
following could BEST prevent this issue from occurring again?
Which of the following would be used to advertise a public IP address on redundant WAN circuits?
Which of the following would be used to advertise a public IP address on redundant WAN circuits?
Which of the following describes when an application is able to reuse Windows login credentials?
Which of the following describes when an application is able to reuse Windows login credentials?
which of the following ports share the same connector?
USB 2.0 and which of the following ports share the same connector?
Which of the following BEST addresses this concern?
A security administrator wishes to increase the security of the wireless network. Which of the
following BEST addresses this concern?
Which of the following should be changed to route users to the secondary datacenter in case of a primary site
A company has deployed a website which is mirrored at a secondary datacenter. Which of the
following should be changed to route users to the secondary datacenter in case of a primary site
failure?
which of the following steps should be taken?
In order to prevent other users from editing files in ‘C:\ Files’, which of the following steps should be
taken?
Which of the following functions needs to be disabled on the router to prevent conflicts?
A computer technician is installing a new wireless router for a small office. The office already has an
internal device that assigns addresses to users. Which of the following functions needs to be
disabled on the router to prevent conflicts?
Which of the following risk mitigation strategies is MOST important to the security manager?
The system administrator has deployed updated security controls for the network to limit risk
of attack. The security manager is concerned that controls continue to function as intended
to maintain appropriate security posture. Which of the following risk mitigation strategies is
MOST important to the security manager?
Which of the following is the FIRST step that must be performed?
A security administrator is being hired to perform a penetration test of a third-party cloud provider
as part of an annual security audit. Which of the following is the FIRST step that must be performed?